serendipity Exploited Vulnerabilities